https://www.phoronix.com/scan.php?page=news_item&px=Apple-M1-PACMAN
Researchers from MIT found that the Arm Pointer Authentication functionality within the M1 can be defeated and without traces. The researchers allege, “PACMAN utilizes a hardware mechanism, so no software patch can ever fix it.” With Arm Pointer Authentication still being new and only added to the Armv8.3-A specification, it will be interesting to see if similar Arm SoCs also prove vulnerable to this particular attack.
Auch ARM Prozessoren haben offenbar Hardware-Verwundbarkeiten, so wie Intel mit den Spectre-Bugs. Via dem Erraten des „Pointer Authentication Codes“ können aber dennoch nur bereits bestehende Fehler in Anwendungssoftware angegriffen werden.